Notation with internal certificate authority #1103
-
Hi, We try to activate ratify and pull image with registry where signature is done by notation with our internal CA. No problem to sign and check signature with notation but on ratify we get the following error
We install ratify with helm and give our CA with this values extract: notationCert: |
-----BEGIN CERTIFICATE-----
CERTDATA
-----END CERTIFICATE----- To be more precise, when we launch a signed artefact with kubectl run --image internal-registry/library/busybox:1.34.1-glibc test We get the following error
|
Beta Was this translation helpful? Give feedback.
Replies: 4 comments
-
Hi @olopost, Thanks for reaching out. Here's a few questions to get started for us to be able to diagnose the issue:
notation inspect internal-registry/library/busybox:1.34.1-glibc Note: (please redact any sensitive cert info from the output) |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
Our issue definitely came from the fact that the image had 2 signatures from 2 different certificates. Once I made sure that the image I was doing the tests with was only signed by the certificate I want, ratify is working as expected. Thanks for your help ! |
Beta Was this translation helpful? Give feedback.
-
@tesence glad you were able to get unblocked. The default policy recommended in the quick start is the most strict policy we have. It requires every single artifact attached to the image verify to true for it to pass admission. We define a few other rego templates depending on the scenario. You can learn more about those here: https://ratify.dev/docs/1.0/reference/rego-templates |
Beta Was this translation helpful? Give feedback.
Hi @olopost,
Thanks for reaching out. Here's a few questions to get started for us to be able to diagnose the issue:
ConstraintTemplate
in the templates.gatekeeper.sh definition group.